This column is currently busy serving other more-deserving readers. Please wait while we play Wagner's Ring Cycle—or you can piss off quick—who needs you Philistines? You can press #1 for Solti (the default), #2 for Karajan or #3 for Sir Andrew Lloyd Webber. Be warned: #3 is the gotchyer exit that precludes all future re-entry.
We'll “hangup” on you, reminding us that the anachronism has survived wondrously from Homer's misplaced metallurgy (according to Robert Graves, Homer nodded over his iron and bronze age technologies), through Shakespeare's chiming clocks (Julius Caesar), and into our post-vertical ebonite telephony.
We no longer “hangup” the phone, simply bang the bugger down flat. Yet there's still a BEL lurking in the ASCII char-set although gongs per se have been replaced by tones—and even Ma Bell, my ever-pined heartthrob (I had her once in the back of a London taxi), has deserted wire-ridden communications for cable TV and credit cards.
Simple verbs such as “ship” have also suffered the anachronistic “curse”. When X says they'll “ship” Y by Z, or else, I can't help but think of the Titanic, Lusatania, Bismarck and Scharnhorst.
Digging deeper, dear patient reader, Virgil and that crowd, predicted the near-future subjunctive gerundive (whatever) with in navem impositurus esse (to be about to [load] ship), but with the ironical secondary meaning of imponere (to deceive or cheat).
Meanwhile, by the time this column reaches you, Bob Toxen's long-awaited tour-de-force Real World Linux Security—Intrusion Prevention, Detection and Recovery (Prentice-Hall) should have been shipped, nay, airmailed, to a bookshelf or Amazon site near you. I can now reveal the identity of the Mystery Man prefacer hinted at in the pre-pub manuscripts I've been enjoying. No other than Eric Raymond who is much more qualified than moi to test and endorse Bob Toxen's efforts. Further, the book has gained a positive blurb from Steve Bourne, without whose pioneering shell where we would be today?
Check www.cavu.com/book.html for the latest price/availabity news. Security is one of those ever-changing challenges. As Bob told me, he feared his book, like Tristram Shandy's memoirs, could never be completed: “It's killing me and may appear posthumously.”
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Devuan Beta Release
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- The Humble Hacker?
- The Death of RoboVM
- BitTorrent Inc.'s Sync
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- AdaCore's SPARK Pro
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide